2
WWW.KEATRINTECHNOLOGY.COM 1 CAPABILITIES STATEMENT COMPANY OVERVIEW Delivering Innovation Through Inspiration Ketrica Green, President EMAIL: [email protected] PHONE: (817) 381 5675 www.KeatrinTechnology.com • Cyber Security Solution Experts • KeatrinTechnology Solutions was founded in 2013 Focus on Information Assurance/Security, IT Audit, and A&A • Experience serving small and large organizations • Experience in Public & Private Sectors INFORMATION SECURITY PENETRATION TESTING VULNERABILITY SCANNING ETHICAL HACKING CYBER SECURITY CONSULTING • Design and implement security/privacy solutions for our clients to prevent security breaches and manage regulatory compliance Consultants certified in CISSP, CSSLP, CISM, CISA, CRISC, CEH, CIPP, CIPP/G, CCNA, CCNP, MCSE, Six Sigma, PCI-DSS INFORMATION / CYBER SECURITY SOLUTIONS INFORMATION ASSURANCE / PRIVACY ASSESSMENT OWASP Methodology Standards NIST 800-53, ISO 27001/2 Based Secu- rity Assessment • Vulnerability Assessment & Penetra- tion Testing Third-party (Vendor) Security Review / Assessment Regulatory Compliance (FFIEC, PCI, SOX, HIPPA), GLBA • Privacy Documentation, Privacy Im- pact Assessment (PIA) NAICS PARTNERS CERTIFICATIONS DUNS CAGE INFORMATION SECURITY / INFORMATION ASSURANCE SOLUTIONS • Information Security Policy and Stan- dards Development • Cloud and Virtual Security Mobile Security/AWS Cloud Security • Network and Application Security/ Development Identity & Access Management (IDAM) IT Audit, Regulatory Compliance Audit (FISMA, NIST SP 800) Continuous Monitoring/Risk Manage- ment APPLICATION DEVELOPMENT AND SECURITY Secure Development Life Cycle (SDLC) • Secure Application and Database Development Configuration and Change Manage- ment Secure Code Review, Threat Modeling Manual Penetration Testing / Vulnerability Scanning-Mobile Application, Wireless & Network Security Biometrics Testing Including Fingerprint & Iris Scan *541511 *518210 *541512 *511210 *541513 *541519 • Disabled-Veteran, Minority-Owned • GSA Schedule 70: Pending Hub Zone Certification: Pending 8a Certification: Pending Arkansas Certified SB (Micro) 0794399315 75LN5

INFORMATION / CYBER SECURITY SOLUTIONS · 2020-01-11 · INFORMATION SECURITY PENETRATION TESTING VULNERABILITY SCANNING ETHICAL HACKING CYBER SECURITY CONSULTING • Design and implement

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: INFORMATION / CYBER SECURITY SOLUTIONS · 2020-01-11 · INFORMATION SECURITY PENETRATION TESTING VULNERABILITY SCANNING ETHICAL HACKING CYBER SECURITY CONSULTING • Design and implement

WWW.KEATRINTECHNOLOGY.COM 1

CAPABILITIESSTATEMENT

COMPANY OVERVIEW

Delivering Innovation Through Inspiration

Ketrica Green, PresidentE M A I L : [email protected] H O N E : (817) 381 5675www.KeatrinTechnology.com

• Cyber Security Solution Experts• KeatrinTechnology Solutions was founded in 2013• Focus on Information Assurance/Security, IT Audit, and A&A• Experience serving small and large organizations• Experience in Public & Private Sectors

INFORMATION SECURITYPENETRATION TESTING

VULNERABILITY SCANNINGETHICAL HACKING

CYBER SECURITY CONSULTING

• Design and implement security/privacy solutions for our clients to prevent security breaches and manage regulatory compliance

• Consultants certified in CISSP, CSSLP, CISM, CISA, CRISC, CEH, CIPP, CIPP/G, CCNA, CCNP, MCSE, Six Sigma, PCI-DSS

INFORMATION / CYBER SECURITY SOLUTIONS

INFORMATION ASSURANCE / PRIVACY ASSESSMENT

• OWASP Methodology Standards• NIST 800-53, ISO 27001/2 Based Secu-

rity Assessment• Vulnerability Assessment & Penetra-

tion Testing• Third-party (Vendor) Security Review /

Assessment• Regulatory Compliance (FFIEC, PCI,

SOX, HIPPA), GLBA• Privacy Documentation, Privacy Im-

pact Assessment (PIA)

NAICS PARTNERSCERTIFICATIONS

DUNS CAGE

INFORMATION SECURITY / INFORMATION ASSURANCE

SOLUTIONS

• Information Security Policy and Stan-dards Development

• Cloud and Virtual Security• Mobile Security/AWS Cloud Security • Network and Application Security/

Development• Identity & Access Management (IDAM)• IT Audit, Regulatory Compliance Audit

(FISMA, NIST SP 800)• Continuous Monitoring/Risk Manage-

ment

APPLICATION DEVELOPMENT AND SECURITY

• Secure Development Life Cycle (SDLC)• Secure Application and Database

Development• Configuration and Change Manage-

ment• Secure Code Review, Threat Modeling

Manual Penetration Testing / Vulnerability Scanning-Mobile Application, Wireless & Network Security

Biometrics Testing Including Fingerprint & Iris Scan

*541511 *518210 *541512 *511210 *541513 *541519

• Disabled-Veteran, Minority-Owned• GSA Schedule 70: Pending• Hub Zone Certification: Pending• 8a Certification: Pending• Arkansas Certified SB (Micro) 0794399315 75LN5

Page 2: INFORMATION / CYBER SECURITY SOLUTIONS · 2020-01-11 · INFORMATION SECURITY PENETRATION TESTING VULNERABILITY SCANNING ETHICAL HACKING CYBER SECURITY CONSULTING • Design and implement

WWW.KEATRINTECHNOLOGY.COM 2

KEATRIN TECHNOLOGY SOLUTIONS LLCDelivering Innovation Through Inspiration

Ketrica Green, PresidentE M A I L : [email protected]

P H O N E : (817) 381 5675www.KeatrinTechnology.com

DELIVERY MANAGEMENT FRAMEWORK

PROJECTCHARTER

PROJECTPLAN

STAKEHOLDERMANAGEMENT

PLAN

ISSUES & RISKMANAGEMENT

STATUSREPORTING

ENGAGEMENT INITIATION PROCESS

SCOPING CALL

ENGAGEMENT CLOSEPROCESS

KNOWLEDGETRANSFER PLAN

DEFENSE CYBER SECURITY REQUIREMENTSKeatrin Technology Solutions helps businesses with the set of minimum cybersecurity families as described in NIST Special Pub-lication 800-53 and NIST 800-171 in the following control areas:

KT Solutions will provide small businesses a systematic step-by-step approach to implementing, assessing and monitoring security controls.

• Access Control

• Awareness & Training

• Audit & Accountability

• Configuration Management

• Indentification & Authentication

• Incident Response

• Maintenance

• Media Protection

• Personal Security

• Physical Protection

• Risk Assessment

• Security Assessment

• System & Com Protection

• System & Info Integrity

1. Authorize Information Systems

2. Monitor Security Controls

3. Categorize Information Systems

4. Select Security Controls

5. Implement Security Controls

6. Assess Security Controls